Into the Bytecode cover image

#45 – Quintus Kilbourn on TEEs and Secure Hardware

Into the Bytecode

00:00

Exploring Vulnerabilities in Trusted Execution Environments

This chapter explores the security weaknesses tied to Trusted Execution Environments and secure hardware, detailing various attack methods like replay and side-channel attacks. The discussion highlights the urgent need for enhanced defenses as current systems may be inadequate in safeguarding sensitive data.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app